Violation of privacy.

Privacy goes hand-in-hand with security, but many of the activities of information security analysts seem to be in violation of privacy. Discuss how employers can justify the use of security tools, such as Encase by Guidance Software.